Zobrazeno 1 - 10
of 1 039
pro vyhledávání: '"Common Criteria"'
Autor:
Kunz, Guilherme1 guilherme.kunz@unioeste.br, Machado, José2 jmachado@dem.uminho.pt, Perondi, Eduardo3 eduardo.perondi@ufrgs.br
Publikováno v:
Neural Computing & Applications. May2017, Vol. 28 Issue 5, p1031-1041. 11p.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Roy, Debapriya Basu, Bhasin, Shivam, Guilley, Sylvain, Heuser, Annelie, Patranabis, Sikhar, Mukhopadhyay, Debdeep
Publikováno v:
IEEE Transactions on Computers. 3/1/2019, Vol. 68 Issue 3, p347-361. 15p.
Publikováno v:
IEEE Access, Vol 11, Pp 9113-9121 (2023)
The ability of a cryptographic system to protect information from attacks depends on many factors, including the secrecy of the encryption key. A crucial aspect of any cryptosystem is how it manages the encryption keys. Encryption Key Management (EKM
Externí odkaz:
https://doaj.org/article/1bbf03ccf316468aa92e2bed2a032baa
Autor:
Bozek, Allan1
Publikováno v:
IEEE Transactions on Industry Applications. Mar/Apr2018, Vol. 54 Issue 2, p1881-1889. 9p.
Autor:
Nan Sun, Chang-Tsun Li, Hin Chan, Ba Dung Le, Md Zahidul Islam, Leo Yu Zhang, Md Rafiqul Islam, Warren Armstrong
Publikováno v:
IEEE Access, Vol 10, Pp 44756-44777 (2022)
Advances in emerging Information and Communications Technology (ICT) technologies push the boundaries of what is possible and open up new markets for innovative ICT products and services. The adoption of ICT products and systems with security propert
Externí odkaz:
https://doaj.org/article/6fd9f17d6a0740ff97c769bad4eb6c7a
Publikováno v:
IEEE Access, Vol 10, Pp 71749-71763 (2022)
Cyber assurance, which is the ability to operate under the onslaught of cyber attacks and other unexpected events, is essential for organizations facing inundating security threats on a daily basis. Organizations usually employ multiple strategies to
Externí odkaz:
https://doaj.org/article/c3c4e61c0d054a989ae52d1853939946
Autor:
Caserza Magro, Micaela1, Pinceti, Paolo1 paolo.pinceti@unige.it, Rocca, Luca1, Rossi, Giorgio1
Publikováno v:
International Journal of Electrical Power & Energy Systems. Jan2019, Vol. 104, p515-523. 9p.
Autor:
Maheen Fatima, Haider Abbas, Tahreem Yaqoob, Narmeen Shafqat, Zarmeen Ahmad, Raja Zeeshan, Zia Muhammad, Tauseef Rana, Shynar Mussiraliyeva
Publikováno v:
PeerJ Computer Science, Vol 7, p e701 (2021)
Over the last few years, private and public organizations have suffered an increasing number of cyber-attacks owing to excessive exploitation of technological vulnerabilities. The major objective of these attacks is to gain illegal profits by extorti
Externí odkaz:
https://doaj.org/article/4ffe5981de3840b789149f7623c56354
Publikováno v:
Standards (2305-6703); Jun2022, Vol. 2 Issue 2, p136-156, 21p